Sciweavers

221 search results - page 13 / 45
» The Effects of Multiple Algorithms in the Advanced Encryptio...
Sort
View
BIBE
2007
IEEE
151views Bioinformatics» more  BIBE 2007»
13 years 10 months ago
On the Effectiveness of Constraints Sets in Clustering Genes
—In this paper, we have modified a constrained clustering algorithm to perform exploratory analysis on gene expression data using prior knowledge presented in the form of constr...
Erliang Zeng, Chengyong Yang, Tao Li, Giri Narasim...
ISAAC
2003
Springer
91views Algorithms» more  ISAAC 2003»
14 years 1 months ago
Quantum Merlin-Arthur Proof Systems: Are Multiple Merlins More Helpful to Arthur?
This paper introduces quantum “multiple-Merlin”-Arthur proof systems in which Arthur receives multiple quantum proofs that are unentangled with each other. Although classical ...
Hirotada Kobayashi, Keiji Matsumoto, Tomoyuki Yama...
EC
2006
195views ECommerce» more  EC 2006»
13 years 8 months ago
Automated Global Structure Extraction for Effective Local Building Block Processing in XCS
Learning Classifier Systems (LCSs), such as the accuracy-based XCS, evolve distributed problem solutions represented by a population of rules. During evolution, features are speci...
Martin V. Butz, Martin Pelikan, Xavier Llorà...
CIKM
2006
Springer
14 years 11 days ago
Optimisation methods for ranking functions with multiple parameters
Optimising the parameters of ranking functions with respect to standard IR rank-dependent cost functions has eluded satisfactory analytical treatment. We build on recent advances ...
Michael J. Taylor, Hugo Zaragoza, Nick Craswell, S...
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
14 years 2 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus